The smart phone has changed our behavior, sometimes for the better as we are now able to connect and engage with many more people than ever before, sometimes for the worse in that we may have become over-reliant on the connectivity with the outside world that these devices afford us. Either way, there is no going back for the majority of users who can almost instantaneously connect with hundreds if not thousands of people through the various social media and other applications available on such devices and not least through the humble phone call.

However, our dependence brings anxiety. The loss of one's smart phone not only represents an immediate disconnection from one's online contacts but is also a potential privacy and security risk should the lost phone wend its way into the hands of a malicious third party. Writing in the International Journal of Mobile Communications, a Canadian team outlines the possible coping mechanisms that might be needed following loss or theft and the security problems that the user might face. The researchers point out that the same anxieties apply equally to lost or stolen laptops, tablet computers and other digital devices.

Zhiling Tu, Yufei Yuan and Norm Archer of McMaster University in Hamilton, Ontario, explain that the convenience of mobility, wireless communication and the information processing power of smart phones and other portable digital devices has led to more and more people carrying with them valuable data assets wherever they go. These assets may include personal and business contacts, private pictures and videos, meeting and lecture notes and the like, banking details, utility statements, company spreadsheets and much more. All such assets are potentially sensitive to abuse by third parties.

The researchers add that as many companies now have a BYOD (bring-your-own-device) policy rather than dispensing a standard corporate device to all employees there are additional security issues that arise from their being centralized control of the data on a given device. The value of lost hardware might be negligible when compared to the loss of sensitive or proprietary data. Perhaps more troubling is that while there are various countermeasures that can be used to cope with mobile device loss and theft, users are either unaware of their existence or unwilling to use them. The cost and convenience of security countermeasures also need to be weighed up.

The team has investigated how general mobile phone users might not cope with the threat of losing their device. They found that a few active and security-conscious users were aware of countermeasures but many users were either not aware of "time bomb" data deletion settings and remote device locks and such or were simply in denial of the risk of their losing their phone. Their findings suggest that an awareness campaign might be needed to encourage general users to make their devices more secure and that organizations must enforce certain features on their employees and members to protect sensitive data that might be on those devices beyond their direct control.

July 30, 2015  It is possible to predict the timing and intensity of influenza outbreaks in subtropical climates like Hong Kong where flu seasons can occur at different times and more than once during a year, ... read more

July 30, 2015  A new automated data mining system could lead to a dramatic increase in the detection of potentially illegal online sales of elephant ivory through eBay. Law enforcement agencies and conservationist ... read more

July 28, 2015  Researchers explain how the new paradigm of a digital healthcare system, as it matures, is putting the picture of the doctor-patient relationship in an entirely new frame and not always in a positive ... read more

July 29, 2014  A new study shows consumer savings from the Kill Switch legislation exceed initial projections and now points to well over $3 billion. This savings to consumers comes at the expense of insurance and ... read more

Oct. 17, 2013  Scientists have developed technology whereby a ring, structure nail or wristband acts as a user interface allowing files to be transferred directly from one screen to another by touch. The new ... read more

July 22, 2013  A new system that goes by the name of "hybrid contextual cloud in ubiquitous platforms comprising of smart phones" or HYCCUPS for short, has been developed by computer scientists. The ... read more

Feb. 17, 2012  We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an ... read more